Commit 26703c63 authored by Kees Cook's avatar Kees Cook

um/ptrace: run seccomp after ptrace

Close the hole where ptrace can change a syscall out from under seccomp.
Signed-off-by: default avatarKees Cook <keescook@chromium.org>
Cc: Jeff Dike <jdike@addtoit.com>
Cc: Richard Weinberger <richard@nod.at>
Cc: user-mode-linux-devel@lists.sourceforge.net
parent 635efc70
...@@ -20,12 +20,12 @@ void handle_syscall(struct uml_pt_regs *r) ...@@ -20,12 +20,12 @@ void handle_syscall(struct uml_pt_regs *r)
UPT_SYSCALL_NR(r) = PT_SYSCALL_NR(r->gp); UPT_SYSCALL_NR(r) = PT_SYSCALL_NR(r->gp);
PT_REGS_SET_SYSCALL_RETURN(regs, -ENOSYS); PT_REGS_SET_SYSCALL_RETURN(regs, -ENOSYS);
/* Do the secure computing check first; failures should be fast. */ if (syscall_trace_enter(regs))
if (secure_computing(NULL) == -1)
return; return;
if (syscall_trace_enter(regs)) /* Do the seccomp check after ptrace; failures should be fast. */
goto out; if (secure_computing(NULL) == -1)
return;
/* Update the syscall number after orig_ax has potentially been updated /* Update the syscall number after orig_ax has potentially been updated
* with ptrace. * with ptrace.
...@@ -37,6 +37,5 @@ void handle_syscall(struct uml_pt_regs *r) ...@@ -37,6 +37,5 @@ void handle_syscall(struct uml_pt_regs *r)
PT_REGS_SET_SYSCALL_RETURN(regs, PT_REGS_SET_SYSCALL_RETURN(regs,
EXECUTE_SYSCALL(syscall, regs)); EXECUTE_SYSCALL(syscall, regs));
out:
syscall_trace_leave(regs); syscall_trace_leave(regs);
} }
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment